A method of operating a security system characterized by the steps of: a) recording independently data on personal property acquired by an entity, and b) allowing at least one party to access at least some of that data to check the veracity of information given separately by another party.